Explore careers

Want to be part of the innovative teams on the frontlines of climate technology? View open jobs and easily apply.

Aerial view of a mall plane flying over fields
\n\n\n\n

\n\n\n\n\n \n\n
<script type="text/javascript" src="https://app.jibecdn.com/prod/cdn.js"></script>\n
\n\n\n
<div id="skip" class="jibe-container" role="navigation" aria-label="link navigation">\n  <button class="skip-to-main" onclick="skipToMain()" role="link">Skip to Main Content</button>\n</div>\n\n  <div id="all-content" class="snap-content " role="main">\n      \n\n    <section class="header-container" role="navigation">\n
\n
\n
\n \n\n\n\n
\n
\n \n \"logo\"\n
\n
\n \n \n
\n
\n
\n
\n / home \n
\n
\n
\n \n\n
</div>         \n<div class="collapse mobile-menu navbar-nav" id="header-nav--collapse">\n    <ul class="header__menu">\n      <li class="content-first">\n
\n

Search Jobs\n

\n\n
  • Home
  • \n
  • Work
  • \n
  • Life
  • \n
  • Students
  • \n
  • Check Application Status
  • \n \n
    \n
    \n \n\n\n \n\n \n \n\n
    <descriptions-app style="display: block;" _nghost-ddr-c72="" ng-version="11.0.5"><div _ngcontent-ddr-c72="" class="job-description-container">\n
    \n
    \n
    \n\n
    \n
    \n
    \n

    Senior Privilege Access Management Engineer

    \n\n
    \n\n
    \n
    \n

    Job Description

    \n
    About Rivian

    Rivian is on a mission to keep the world adventurous forever. This goes for the emissions-free Electric Adventure Vehicles we build, and the curious, courageous souls we seek to attract. 

    \n

     

    \n

    As a company, we constantly challenge what’s possible, never simply accepting what has always been done. We reframe old problems, seek new solutions and operate comfortably in areas that are unknown. Our backgrounds are diverse, but our team shares a love of the outdoors and a desire to protect it for future generations. 


    Role Summary

    As a Senior Privilege Access Management (PAM), you will play a key role in designing, implementing, and managing privileged access controls to safeguard critical systems and data. You will be responsible for ensuring the effective and secure management of privileged accounts, access rights, and workflows across the organization.


    Responsibilities

      \n
    • PAM Solution Design and Implementation: Design, architect, and implement privilege access management solutions, focusing on technologies like BeyondTrust or other PAM solutions. Assess business requirements, identify system vulnerabilities, and develop strategies to protect privileged accounts and access.
    • \n
    • Privileged Account Management: Manage the lifecycle of privileged accounts, including provisioning, deprovisioning, and access reviews. Establish access controls, policies, and procedures to mitigate the risk associated with privileged accounts. Monitor and enforce privileged access management policies.
    • \n
    • IAM Integration: Integrate privilege access management solutions with existing Identity and Access Management (IAM) systems and processes. Collaborate with IAM teams to ensure a cohesive and comprehensive approach to access control and security.
    • \n
    • Cybersecurity and Risk Management: Assess cybersecurity risks related to privileged access and develop strategies to mitigate those risks. Stay updated with the latest cybersecurity threats and industry best practices. Conduct periodic risk assessments and vulnerability scans to identify and address potential vulnerabilities.
    • \n
    • Code Development and Automation: Develop custom scripts, tools, and automation workflows to streamline privileged access management processes. Automate repetitive tasks, implement role-based access controls, and enhance operational efficiency
    • \n
    • Incident Response and Forensics: Provide support during security incidents related to privileged accounts. Collaborate with incident response teams to investigate security breaches and perform forensic analysis of compromised accounts. Recommend and implement measures to prevent future incidents.
    • \n
    • Documentation and Reporting: Create and maintain documentation, including design specifications, configuration guides, and standard operating procedures. Generate reports on privileged access management activities, including access requests, approvals, and entitlements.
    • \n
    • Collaboration and Training: Collaborate with cross-functional teams, including IT, cybersecurity, and compliance, to ensure alignment and adherence to privileged access management policies and procedures. Conduct training sessions and awareness programs for end-users and system administrators.
    • \n
    • Continuous Improvement: Continuously assess and enhance the privilege access management program. Identify opportunities for process improvements, system optimization, and automation. Stay updated with industry trends and emerging technologies in privileged access management.
    • \n

    Qualifications

      \n
    • Bachelor's or Master's degree in Computer Science, Information Security, or a related field.
    • \n
    • At least 5 years of experience as a Privilege Access Management Engineer or similar role, with a focus on IAM and Cybersecurity.
    • \n
    • Strong understanding of privileged access management concepts, principles, and best practices.
    • \n
    • Experience with Beyond Insight applications like Password Safe, Secret Safe, EPM or similar PAM solutions.
    • \n
    • Proficient in coding and scripting languages such as Python, PowerShell, or Shell scripting.
    • \n
    • Solid knowledge of IAM technologies, protocols, and standards (e.g., LDAP, SAML, OAuth).
    • \n
    • Familiarity with cybersecurity frameworks (e.g., NIST Cybersecurity Framework, ISO 27001) and compliance requirements.
    • \n
    • Excellent problem-solving and analytical skills, with the ability to assess risks and provide effective solutions.
    • \n
    • Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams.
    • \n
    • Self-motivated and driven to stay updated with the latest IAM and cybersecurity trends and technologies.
    • \n
    • CISSP, CISM, or other relevant certifications are a plus.
    • \n



    Equal Opportunity

    \n

    Rivian is an equal opportunity employer and complies with all applicable federal, state, and local fair employment practices laws. All qualified applicants will receive consideration for employment without regard to race, color, religion, national origin, ancestry, sex, sexual orientation, gender, gender expression, gender identity, genetic information or characteristics, physical or mental disability, marital/domestic partner status, age, military/veteran status, medical condition, or any other characteristic protected by law.

    \n

     

    \n

    Rivian is committed to ensuring that our hiring process is accessible for persons with disabilities. If you have a disability or limitation, such as those covered by the Americans with Disabilities Act, that requires accommodations to assist you in the search and application process, please email us at candidateaccommodations@rivian.com.

    \n

    Candidate Data Privacy

    \n

    Rivian may collect, use and disclose your personal information or personal data (within the meaning of the applicable data protection laws) when you apply for employment and/or participate in our recruitment processes (“Candidate Personal Data”). This data includes contact, demographic, communications, educational, professional, employment, social media/website, network/device, recruiting system usage/interaction, security and preference information. Rivian may use your Candidate Personal Data for the purposes of (i) tracking interactions with our recruiting system; (ii) carrying out, analyzing and improving our application and recruitment process, including assessing you and your application and conducting employment, background and reference checks; (iii) establishing an employment relationship or entering into an employment contract with you; (iv) complying with our legal, regulatory and corporate governance obligations; (v) recordkeeping; (vi) ensuring network and information security and preventing fraud; and (vii) as otherwise required or permitted by applicable law. 

    \n

     

    \n

    Rivian may share your Candidate Personal Data with (i) internal personnel who have a need to know such information in order to perform their duties, including individuals on our People Team, Finance, Legal, and the team(s) with the position(s) for which you are applying; (ii) Rivian affiliates; and (iii) Rivian’s service providers, including providers of background checks, staffing services, and cloud services. 

    \n

     

    \n

    Rivian may transfer or store internationally your Candidate Personal Data, including to or in the United States, Canada, the United Kingdom, and the European Union and in the cloud, and this data may be subject to the laws and accessible to the courts, law enforcement and national security authorities of such jurisdictions.  

    \n

     

    \n

    Please note that we are currently not accepting applications from third party application services.

    \n
    \n\n
    \n\n
    \n
    \n\n \n\n \n\n \n \n\n \n
    <!-- FOR BRANDING SPECIFIC TRACKING SCRIPTS -->\n\n\n\n\n    \n
    \n\n
    \n
    \n
    \n

    Subscribe to learn about our latest news, updates and adventures.

    \n
    \n \n
    \n
    \n\n\n
    \n
    \n
    \n
    \n
    \n R1T\n R1S\n Gear Shop\n
    \n
    \n Fleet\n Our Company\n \n
    \n \n \n
    \n
    \n \n \n \n\n
          <a href="https://www.instagram.com/rivianofficial/" token-data="LP.FOOTER.SOCIAL-LINK_2" token-type="text" target="_blank">\n        <i class="fa fa-instagram" aria-hidden="true"></i>\n      </a>\n      <a href="https://twitter.com/rivian" token-data="LP.FOOTER.SOCIAL-LINK_3" token-type="text" target="_blank">\n        <i class="fa fa-twitter" aria-hidden="true"></i>\n      </a>\n      <a href="https://www.youtube.com/channel/UCPMdVVKDEUrbp3nH46sTZmg" token-data="LP.FOOTER.SOCIAL-LINK_4" token-type="text" target="_blank">\n        <i class="fa fa-youtube-play" aria-hidden="true"></i>\n      </a>\n  </div>\n</div>\n
    \n
    \n
    \n
    \n

    \n @ 2023, Rivian. All Rights Reserved.\n

    \n Privacy Policy\n Terms of Use \n

    \n @ 2023, Rivian. All Rights Reserved.\n

    \n
    \n
    \n
    \n\n\n\n\n\n\n\n\n\n\n\n\n\n
      </div>\n
    \n\n\n\n\n\n\n\n\n\n\n\n\n\n \n \n\n\n
    <script> window.jobDescriptionConfig = {"socialShare":true,"job":{"slug":"11777","category":[" Information Technology"],"full_location":"Belgrade, Serbia","short_location":"Belgrade, Serbia","language":"en-us","languages":["en-us"],"client_code":"rivian","req_id":"11777","title":"Senior Privilege Access Management Engineer","description":"<strong>About Rivian</strong><br><br><p style=\\"margin: 0px;\\">Rivian&nbsp;is on a mission to keep the world adventurous forever. This goes for the emissions-free Electric Adventure Vehicles we build, and the curious, courageous souls we seek to attract.&nbsp;</p><p style=\\"margin: 0px;\\">&nbsp;</p><p style=\\"margin: 0px;\\">As a company, we constantly challenge what&rsquo;s possible, never simply accepting what has always been done. We reframe old problems, seek new solutions and operate comfortably in areas that are unknown. Our backgrounds are diverse, but our team shares a love of the outdoors and a desire to protect it for future generations.&nbsp;</p> <br><strong>Role Summary</strong><br><br><p style=\\"margin: 0px;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">As a Senior Privilege Access Management (PAM), you will play a key role in designing, implementing, and managing privileged access controls to safeguard critical systems and data. You will be responsible for ensuring the effective and secure management of privileged accounts, access rights, and workflows across the organization.</span></p> <br><strong>Responsibilities</strong><br><br><ul><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">PAM Solution Design and Implementation: Design, architect, and implement privilege access management solutions, focusing on technologies like BeyondTrust or other PAM solutions. Assess business requirements, identify system vulnerabilities, and develop strategies to protect privileged accounts and access.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Privileged Account Management: Manage the lifecycle of privileged accounts, including provisioning, deprovisioning, and access reviews. Establish access controls, policies, and procedures to mitigate the risk associated with privileged accounts. Monitor and enforce privileged access management policies.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">IAM Integration: Integrate privilege access management solutions with existing Identity and Access Management (IAM) systems and processes. Collaborate with IAM teams to ensure a cohesive and comprehensive approach to access control and security.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Cybersecurity and Risk Management: Assess cybersecurity risks related to privileged access and develop strategies to mitigate those risks. Stay updated with the latest cybersecurity threats and industry best practices. Conduct periodic risk assessments and vulnerability scans to identify and address potential vulnerabilities.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Code Development and Automation: Develop custom scripts, tools, and automation workflows to streamline privileged access management processes. Automate repetitive tasks, implement role-based access controls, and enhance operational efficiency</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Incident Response and Forensics: Provide support during security incidents related to privileged accounts. Collaborate with incident response teams to investigate security breaches and perform forensic analysis of compromised accounts. Recommend and implement measures to prevent future incidents.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Documentation and Reporting: Create and maintain documentation, including design specifications, configuration guides, and standard operating procedures. Generate reports on privileged access management activities, including access requests, approvals, and entitlements.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Collaboration and Training: Collaborate with cross-functional teams, including IT, cybersecurity, and compliance, to ensure alignment and adherence to privileged access management policies and procedures. Conduct training sessions and awareness programs for end-users and system administrators.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Continuous Improvement: Continuously assess and enhance the privilege access management program. Identify opportunities for process improvements, system optimization, and automation. Stay updated with industry trends and emerging technologies in privileged access management.</span></li></ul> <br><strong>Qualifications</strong><br><br><ul><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Bachelor's or Master's degree in Computer Science, Information Security, or a related field.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">At least 5 years of experience as a Privilege Access Management Engineer or similar role, with a focus on IAM and Cybersecurity.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Strong understanding of privileged access management concepts, principles, and best practices.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Experience with Beyond Insight applications like Password Safe, Secret Safe, EPM or similar PAM solutions.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Proficient in coding and scripting languages such as Python, PowerShell, or Shell scripting.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Solid knowledge of IAM technologies, protocols, and standards (e.g., LDAP, SAML, OAuth).</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Familiarity with cybersecurity frameworks (e.g., NIST Cybersecurity Framework, ISO 27001) and compliance requirements.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Excellent problem-solving and analytical skills, with the ability to assess risks and provide effective solutions.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Self-motivated and driven to stay updated with the latest IAM and cybersecurity trends and technologies.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">CISSP, CISM, or other relevant certifications are a plus.</span></li></ul> <br><strong class=\\"jdheading\\"></strong><br><br><h4><strong>Equal Opportunity</strong></h4><p style=\\"margin: 0px;\\">Rivian is an equal opportunity employer and complies with all applicable federal, state, and local fair employment practices laws. All qualified applicants will receive consideration for employment without regard to race, color, religion, national origin, ancestry, sex, sexual orientation, gender, gender expression, gender identity, genetic information or characteristics, physical or mental disability, marital/domestic partner status, age, military/veteran status, medical condition, or any other characteristic protected by law.</p><p style=\\"margin: 0px;\\">&nbsp;</p><p style=\\"margin: 0px;\\">Rivian is committed to ensuring that our hiring process is accessible for persons with disabilities. If you have a disability or limitation, such as those covered by the Americans with Disabilities Act, that requires accommodations to assist you in the search and application process, please email us at&nbsp;<a href=\\"mailto:candidateaccommodations@rivian.com?subject=Application%20to%20Rivian%20-%20Assistance%20Request\\" target=\\"_blank\\" rel=\\"noopener\\">candidateaccommodations@rivian.com</a>.</p><h4><strong>Candidate Data Privacy</strong></h4><p style=\\"margin: 0px;\\"><span data-contrast=\\"auto\\">Rivian may collect, use and disclose your personal information or personal data (within the meaning of the applicable data protection laws) when you apply for employment and/or participate in our recruitment processes (&ldquo;Candidate Personal Data&rdquo;). This data includes contact, demographic, communications, educational, professional, employment, social media/website, network/device, recruiting system usage/interaction, security and preference information. Rivian may use your Candidate Personal Data for the purposes of (i) tracking interactions with our recruiting system; (ii) carrying out, analyzing and improving our application and recruitment process, including assessing you and your application and conducting employment, background and reference checks; (iii) establishing an employment relationship or entering into an employment contract with you; (iv) complying with our legal, regulatory and corporate governance obligations; (v) recordkeeping; (vi) ensuring network and information security and preventing fraud; and (vii) as otherwise required or permitted by applicable law.</span><span data-ccp-props=\\"{"335551550":6,"335551620":6,"335559739":240}\\">&nbsp;</span></p><p style=\\"margin: 0px;\\">&nbsp;</p><p style=\\"margin: 0px;\\"><span data-contrast=\\"auto\\">Rivian may share your Candidate Personal Data with (i) internal personnel who have a need to know such information in order to perform their duties, including individuals on our People Team, Finance, Legal, and the team(s) with the position(s) for which you are applying; (ii) Rivian affiliates; and (iii) Rivian&rsquo;s service providers, including providers of background checks, staffing services, and cloud services.</span><span data-ccp-props=\\"{"335551550":6,"335551620":6,"335559739":240}\\">&nbsp;</span></p><p style=\\"margin: 0px;\\">&nbsp;</p><p style=\\"margin: 0px;\\"><span data-contrast=\\"auto\\">Rivian may transfer or store internationally your Candidate Personal Data, including to or in the United States, Canada, the United Kingdom, and the European Union and in the cloud, and this data may be subject to the laws and accessible to the courts, law enforcement and national security authorities of such jurisdictions.&nbsp;</span><span data-ccp-props=\\"{"335551550":6,"335551620":6,"335559739":240}\\">&nbsp;</span></p><p style=\\"margin: 0px;\\">&nbsp;</p><p style=\\"margin: 0px;\\"><strong>Please note that we are currently not accepting applications from third party application services.</strong></p>","location_name":"11 Tadije Sondermajera (Belgrade Serbia)","street_address":"11 Tadije Sondermajera","city":"Belgrade","country":"Serbia","country_code":"RS","postal_code":"11073","location_type":"LAT_LNG","latitude":44.80401,"longitude":20.46513,"additional_locations":[],"categories":[{"name":"Information Technology"}],"tags1":["Full Time"],"department":"","benefits":[],"employment_type":"FULL_TIME","qualifications":"<ul><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Bachelor's or Master's degree in Computer Science, Information Security, or a related field.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">At least 5 years of experience as a Privilege Access Management Engineer or similar role, with a focus on IAM and Cybersecurity.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Strong understanding of privileged access management concepts, principles, and best practices.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Experience with Beyond Insight applications like Password Safe, Secret Safe, EPM or similar PAM solutions.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Proficient in coding and scripting languages such as Python, PowerShell, or Shell scripting.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Solid knowledge of IAM technologies, protocols, and standards (e.g., LDAP, SAML, OAuth).</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Familiarity with cybersecurity frameworks (e.g., NIST Cybersecurity Framework, ISO 27001) and compliance requirements.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Excellent problem-solving and analytical skills, with the ability to assess risks and provide effective solutions.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Self-motivated and driven to stay updated with the latest IAM and cybersecurity trends and technologies.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">CISSP, CISM, or other relevant certifications are a plus.</span></li></ul>","hiring_organization":"Rivian","hiring_organization_logo":"https://Rivian.icims.com/icims2/servlet/icims2?module=AppInert&action=download&id=51&hashed=-1937123","responsibilities":"<ul><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">PAM Solution Design and Implementation: Design, architect, and implement privilege access management solutions, focusing on technologies like BeyondTrust or other PAM solutions. Assess business requirements, identify system vulnerabilities, and develop strategies to protect privileged accounts and access.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Privileged Account Management: Manage the lifecycle of privileged accounts, including provisioning, deprovisioning, and access reviews. Establish access controls, policies, and procedures to mitigate the risk associated with privileged accounts. Monitor and enforce privileged access management policies.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">IAM Integration: Integrate privilege access management solutions with existing Identity and Access Management (IAM) systems and processes. Collaborate with IAM teams to ensure a cohesive and comprehensive approach to access control and security.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Cybersecurity and Risk Management: Assess cybersecurity risks related to privileged access and develop strategies to mitigate those risks. Stay updated with the latest cybersecurity threats and industry best practices. Conduct periodic risk assessments and vulnerability scans to identify and address potential vulnerabilities.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Code Development and Automation: Develop custom scripts, tools, and automation workflows to streamline privileged access management processes. Automate repetitive tasks, implement role-based access controls, and enhance operational efficiency</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Incident Response and Forensics: Provide support during security incidents related to privileged accounts. Collaborate with incident response teams to investigate security breaches and perform forensic analysis of compromised accounts. Recommend and implement measures to prevent future incidents.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Documentation and Reporting: Create and maintain documentation, including design specifications, configuration guides, and standard operating procedures. Generate reports on privileged access management activities, including access requests, approvals, and entitlements.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Collaboration and Training: Collaborate with cross-functional teams, including IT, cybersecurity, and compliance, to ensure alignment and adherence to privileged access management policies and procedures. Conduct training sessions and awareness programs for end-users and system administrators.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Continuous Improvement: Continuously assess and enhance the privilege access management program. Identify opportunities for process improvements, system optimization, and automation. Stay updated with industry trends and emerging technologies in privileged access management.</span></li></ul>","posted_date":"2023-07-03T06:10:00+0000","apply_url":"https://sb-careers-rivian.icims.com/jobs/11777/login","internal":false,"searchable":true,"active":true,"applyable":true,"li_easy_applyable":true,"ats_code":"icims","hiring_flow_name":"iCIMS ATS Hiring Flow","meta_data":{"openingjobs":{"openingJobId":"0000979d4a23e9a5f83aa450ce78a329e5e3"},"icims":{"revision_int":7,"uuid":"37a1b132-6946-4bfb-b92e-133e321c7672","primary_posted_site_object":{"datePosted":"2023-07-03T06:10:00+0000","site":"sb-careers-rivian","siteId":"11d1562e-bc24-4e43-8d96-d25b706dda49"},"date_updated":"2023-09-15T12:17:32Z","config_keys":null,"jps_is_public":true},"elasticsearch":{"es_created":false},"ats_job_hash":"d6e30cb7558e56bf5a00d37ae2aa0dcd","googlejobs":{"jobName":"projects/helpful-passage-853/tenants/cb22eb5b-7e00-0000-0000-007edad744d3/jobs/134217477849522886"},"import_id":"54b1fecb-f4e2-4c4b-987c-5c3e661a81de","redirectOnApply":true,"questionservice":{"id":"27606643"},"import_source":"ImporterService","client_code":"rivian"},"update_date":"2023-09-15T12:18:30+0000","create_date":"2023-07-03T06:11:10+0000"},"jobFormatted":{"categories":"Information Technology","location":"Belgrade, Serbia","title":"Senior Privilege Access Management Engineer","seo_title":["Information+Technology","Belgrade%2C+Serbia","Senior+Privilege+Access+Management+Engineer"],"description":"<strong>About Rivian</strong><br><br><p style=\\"margin: 0px;\\">Rivian&nbsp;is on a mission to keep the world adventurous forever. This goes for the emissions-free Electric Adventure Vehicles we build, and the curious, courageous souls we seek to attract.&nbsp;</p><p style=\\"margin: 0px;\\">&nbsp;</p><p style=\\"margin: 0px;\\">As a company, we constantly challenge what&rsquo;s possible, never simply accepting what has always been done. We reframe old problems, seek new solutions and operate comfortably in areas that are unknown. Our backgrounds are diverse, but our team shares a love of the outdoors and a desire to protect it for future generations.&nbsp;</p> <br><strong>Role Summary</strong><br><br><p style=\\"margin: 0px;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">As a Senior Privilege Access Management (PAM), you will play a key role in designing, implementing, and managing privileged access controls to safeguard critical systems and data. You will be responsible for ensuring the effective and secure management of privileged accounts, access rights, and workflows across the organization.</span></p> <br><strong>Responsibilities</strong><br><br><ul><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">PAM Solution Design and Implementation: Design, architect, and implement privilege access management solutions, focusing on technologies like BeyondTrust or other PAM solutions. Assess business requirements, identify system vulnerabilities, and develop strategies to protect privileged accounts and access.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Privileged Account Management: Manage the lifecycle of privileged accounts, including provisioning, deprovisioning, and access reviews. Establish access controls, policies, and procedures to mitigate the risk associated with privileged accounts. Monitor and enforce privileged access management policies.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">IAM Integration: Integrate privilege access management solutions with existing Identity and Access Management (IAM) systems and processes. Collaborate with IAM teams to ensure a cohesive and comprehensive approach to access control and security.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Cybersecurity and Risk Management: Assess cybersecurity risks related to privileged access and develop strategies to mitigate those risks. Stay updated with the latest cybersecurity threats and industry best practices. Conduct periodic risk assessments and vulnerability scans to identify and address potential vulnerabilities.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Code Development and Automation: Develop custom scripts, tools, and automation workflows to streamline privileged access management processes. Automate repetitive tasks, implement role-based access controls, and enhance operational efficiency</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Incident Response and Forensics: Provide support during security incidents related to privileged accounts. Collaborate with incident response teams to investigate security breaches and perform forensic analysis of compromised accounts. Recommend and implement measures to prevent future incidents.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Documentation and Reporting: Create and maintain documentation, including design specifications, configuration guides, and standard operating procedures. Generate reports on privileged access management activities, including access requests, approvals, and entitlements.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Collaboration and Training: Collaborate with cross-functional teams, including IT, cybersecurity, and compliance, to ensure alignment and adherence to privileged access management policies and procedures. Conduct training sessions and awareness programs for end-users and system administrators.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Continuous Improvement: Continuously assess and enhance the privilege access management program. Identify opportunities for process improvements, system optimization, and automation. Stay updated with industry trends and emerging technologies in privileged access management.</span></li></ul> <br><strong>Qualifications</strong><br><br><ul><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Bachelor's or Master's degree in Computer Science, Information Security, or a related field.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">At least 5 years of experience as a Privilege Access Management Engineer or similar role, with a focus on IAM and Cybersecurity.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Strong understanding of privileged access management concepts, principles, and best practices.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Experience with Beyond Insight applications like Password Safe, Secret Safe, EPM or similar PAM solutions.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Proficient in coding and scripting languages such as Python, PowerShell, or Shell scripting.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Solid knowledge of IAM technologies, protocols, and standards (e.g., LDAP, SAML, OAuth).</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Familiarity with cybersecurity frameworks (e.g., NIST Cybersecurity Framework, ISO 27001) and compliance requirements.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Excellent problem-solving and analytical skills, with the ability to assess risks and provide effective solutions.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Self-motivated and driven to stay updated with the latest IAM and cybersecurity trends and technologies.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">CISSP, CISM, or other relevant certifications are a plus.</span></li></ul> <br><strong class=\\"jdheading\\"></strong><br><br><h4><strong>Equal Opportunity</strong></h4><p style=\\"margin: 0px;\\">Rivian is an equal opportunity employer and complies with all applicable federal, state, and local fair employment practices laws. All qualified applicants will receive consideration for employment without regard to race, color, religion, national origin, ancestry, sex, sexual orientation, gender, gender expression, gender identity, genetic information or characteristics, physical or mental disability, marital/domestic partner status, age, military/veteran status, medical condition, or any other characteristic protected by law.</p><p style=\\"margin: 0px;\\">&nbsp;</p><p style=\\"margin: 0px;\\">Rivian is committed to ensuring that our hiring process is accessible for persons with disabilities. If you have a disability or limitation, such as those covered by the Americans with Disabilities Act, that requires accommodations to assist you in the search and application process, please email us at&nbsp;<a href=\\"mailto:candidateaccommodations@rivian.com?subject=Application%20to%20Rivian%20-%20Assistance%20Request\\" target=\\"_blank\\" rel=\\"noopener\\">candidateaccommodations@rivian.com</a>.</p><h4><strong>Candidate Data Privacy</strong></h4><p style=\\"margin: 0px;\\"><span data-contrast=\\"auto\\">Rivian may collect, use and disclose your personal information or personal data (within the meaning of the applicable data protection laws) when you apply for employment and/or participate in our recruitment processes (&ldquo;Candidate Personal Data&rdquo;). This data includes contact, demographic, communications, educational, professional, employment, social media/website, network/device, recruiting system usage/interaction, security and preference information. Rivian may use your Candidate Personal Data for the purposes of (i) tracking interactions with our recruiting system; (ii) carrying out, analyzing and improving our application and recruitment process, including assessing you and your application and conducting employment, background and reference checks; (iii) establishing an employment relationship or entering into an employment contract with you; (iv) complying with our legal, regulatory and corporate governance obligations; (v) recordkeeping; (vi) ensuring network and information security and preventing fraud; and (vii) as otherwise required or permitted by applicable law.</span><span data-ccp-props=\\"{"335551550":6,"335551620":6,"335559739":240}\\">&nbsp;</span></p><p style=\\"margin: 0px;\\">&nbsp;</p><p style=\\"margin: 0px;\\"><span data-contrast=\\"auto\\">Rivian may share your Candidate Personal Data with (i) internal personnel who have a need to know such information in order to perform their duties, including individuals on our People Team, Finance, Legal, and the team(s) with the position(s) for which you are applying; (ii) Rivian affiliates; and (iii) Rivian&rsquo;s service providers, including providers of background checks, staffing services, and cloud services.</span><span data-ccp-props=\\"{"335551550":6,"335551620":6,"335559739":240}\\">&nbsp;</span></p><p style=\\"margin: 0px;\\">&nbsp;</p><p style=\\"margin: 0px;\\"><span data-contrast=\\"auto\\">Rivian may transfer or store internationally your Candidate Personal Data, including to or in the United States, Canada, the United Kingdom, and the European Union and in the cloud, and this data may be subject to the laws and accessible to the courts, law enforcement and national security authorities of such jurisdictions.&nbsp;</span><span data-ccp-props=\\"{"335551550":6,"335551620":6,"335559739":240}\\">&nbsp;</span></p><p style=\\"margin: 0px;\\">&nbsp;</p><p style=\\"margin: 0px;\\"><strong>Please note that we are currently not accepting applications from third party application services.</strong></p>","qualifications":"<ul><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Bachelor's or Master's degree in Computer Science, Information Security, or a related field.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">At least 5 years of experience as a Privilege Access Management Engineer or similar role, with a focus on IAM and Cybersecurity.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Strong understanding of privileged access management concepts, principles, and best practices.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Experience with Beyond Insight applications like Password Safe, Secret Safe, EPM or similar PAM solutions.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Proficient in coding and scripting languages such as Python, PowerShell, or Shell scripting.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Solid knowledge of IAM technologies, protocols, and standards (e.g., LDAP, SAML, OAuth).</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Familiarity with cybersecurity frameworks (e.g., NIST Cybersecurity Framework, ISO 27001) and compliance requirements.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Excellent problem-solving and analytical skills, with the ability to assess risks and provide effective solutions.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Self-motivated and driven to stay updated with the latest IAM and cybersecurity trends and technologies.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">CISSP, CISM, or other relevant certifications are a plus.</span></li></ul>","responsibilities":"<ul><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">PAM Solution Design and Implementation: Design, architect, and implement privilege access management solutions, focusing on technologies like BeyondTrust or other PAM solutions. Assess business requirements, identify system vulnerabilities, and develop strategies to protect privileged accounts and access.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Privileged Account Management: Manage the lifecycle of privileged accounts, including provisioning, deprovisioning, and access reviews. Establish access controls, policies, and procedures to mitigate the risk associated with privileged accounts. Monitor and enforce privileged access management policies.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">IAM Integration: Integrate privilege access management solutions with existing Identity and Access Management (IAM) systems and processes. Collaborate with IAM teams to ensure a cohesive and comprehensive approach to access control and security.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Cybersecurity and Risk Management: Assess cybersecurity risks related to privileged access and develop strategies to mitigate those risks. Stay updated with the latest cybersecurity threats and industry best practices. Conduct periodic risk assessments and vulnerability scans to identify and address potential vulnerabilities.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Code Development and Automation: Develop custom scripts, tools, and automation workflows to streamline privileged access management processes. Automate repetitive tasks, implement role-based access controls, and enhance operational efficiency</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Incident Response and Forensics: Provide support during security incidents related to privileged accounts. Collaborate with incident response teams to investigate security breaches and perform forensic analysis of compromised accounts. Recommend and implement measures to prevent future incidents.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Documentation and Reporting: Create and maintain documentation, including design specifications, configuration guides, and standard operating procedures. Generate reports on privileged access management activities, including access requests, approvals, and entitlements.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Collaboration and Training: Collaborate with cross-functional teams, including IT, cybersecurity, and compliance, to ensure alignment and adherence to privileged access management policies and procedures. Conduct training sessions and awareness programs for end-users and system administrators.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Continuous Improvement: Continuously assess and enhance the privilege access management program. Identify opportunities for process improvements, system optimization, and automation. Stay updated with industry trends and emerging technologies in privileged access management.</span></li></ul>","clientName":"Rivian Careers Home","locations":"Belgrade, Serbia"},"jdSettings":{"options":{"metadata":{"options":{"enabled":false,"data":[]},"categories":{"enabled":true},"locations":{"enabled":true},"req_id":{"enabled":true},"placement":"top"},"video":{"enabled":false,"placement":"above_description"},"displayFields":{"fieldOrder":["locations","categories"],"fields":[{"item":"locations","token":"JOB_DESCRIPTION.LOCATION","ariaLabel":"JOB_DESCRIPTION.LOCATION_ARIA_LABEL","fieldType":"location"},{"item":"categories","token":"JOB_DESCRIPTION.CATEGORIES","ariaLabel":"JOB_DESCRIPTION.CATEGORIES_ARIA_LABEL","objectArrayKey":"name"}]}}},"sectionOrder":["description"],"getReferredEnabled":false,"addThisDisabled":true,"externalTrackifEnabled":false,"jibeTrackifEnabled":false,"brandName":"careers-home","globalSearchEnabled":false,"jobLangData":[],"referrals":{"enabled":false,"recruit":false},"seoMetaData":{"clientName":"Rivian Careers Home","data":{"slug":"11777","category":[" Information Technology"],"full_location":"Belgrade, Serbia","short_location":"Belgrade, Serbia","language":"en-us","languages":["en-us"],"client_code":"rivian","req_id":"11777","title":"Senior Privilege Access Management Engineer","description":"<strong>About Rivian</strong><br><br><p style=\\"margin: 0px;\\">Rivian&nbsp;is on a mission to keep the world adventurous forever. This goes for the emissions-free Electric Adventure Vehicles we build, and the curious, courageous souls we seek to attract.&nbsp;</p><p style=\\"margin: 0px;\\">&nbsp;</p><p style=\\"margin: 0px;\\">As a company, we constantly challenge what&rsquo;s possible, never simply accepting what has always been done. We reframe old problems, seek new solutions and operate comfortably in areas that are unknown. Our backgrounds are diverse, but our team shares a love of the outdoors and a desire to protect it for future generations.&nbsp;</p> <br><strong>Role Summary</strong><br><br><p style=\\"margin: 0px;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">As a Senior Privilege Access Management (PAM), you will play a key role in designing, implementing, and managing privileged access controls to safeguard critical systems and data. You will be responsible for ensuring the effective and secure management of privileged accounts, access rights, and workflows across the organization.</span></p> <br><strong>Responsibilities</strong><br><br><ul><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">PAM Solution Design and Implementation: Design, architect, and implement privilege access management solutions, focusing on technologies like BeyondTrust or other PAM solutions. Assess business requirements, identify system vulnerabilities, and develop strategies to protect privileged accounts and access.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Privileged Account Management: Manage the lifecycle of privileged accounts, including provisioning, deprovisioning, and access reviews. Establish access controls, policies, and procedures to mitigate the risk associated with privileged accounts. Monitor and enforce privileged access management policies.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">IAM Integration: Integrate privilege access management solutions with existing Identity and Access Management (IAM) systems and processes. Collaborate with IAM teams to ensure a cohesive and comprehensive approach to access control and security.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Cybersecurity and Risk Management: Assess cybersecurity risks related to privileged access and develop strategies to mitigate those risks. Stay updated with the latest cybersecurity threats and industry best practices. Conduct periodic risk assessments and vulnerability scans to identify and address potential vulnerabilities.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Code Development and Automation: Develop custom scripts, tools, and automation workflows to streamline privileged access management processes. Automate repetitive tasks, implement role-based access controls, and enhance operational efficiency</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Incident Response and Forensics: Provide support during security incidents related to privileged accounts. Collaborate with incident response teams to investigate security breaches and perform forensic analysis of compromised accounts. Recommend and implement measures to prevent future incidents.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Documentation and Reporting: Create and maintain documentation, including design specifications, configuration guides, and standard operating procedures. Generate reports on privileged access management activities, including access requests, approvals, and entitlements.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Collaboration and Training: Collaborate with cross-functional teams, including IT, cybersecurity, and compliance, to ensure alignment and adherence to privileged access management policies and procedures. Conduct training sessions and awareness programs for end-users and system administrators.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Continuous Improvement: Continuously assess and enhance the privilege access management program. Identify opportunities for process improvements, system optimization, and automation. Stay updated with industry trends and emerging technologies in privileged access management.</span></li></ul> <br><strong>Qualifications</strong><br><br><ul><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Bachelor's or Master's degree in Computer Science, Information Security, or a related field.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">At least 5 years of experience as a Privilege Access Management Engineer or similar role, with a focus on IAM and Cybersecurity.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Strong understanding of privileged access management concepts, principles, and best practices.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Experience with Beyond Insight applications like Password Safe, Secret Safe, EPM or similar PAM solutions.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Proficient in coding and scripting languages such as Python, PowerShell, or Shell scripting.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Solid knowledge of IAM technologies, protocols, and standards (e.g., LDAP, SAML, OAuth).</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Familiarity with cybersecurity frameworks (e.g., NIST Cybersecurity Framework, ISO 27001) and compliance requirements.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Excellent problem-solving and analytical skills, with the ability to assess risks and provide effective solutions.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Self-motivated and driven to stay updated with the latest IAM and cybersecurity trends and technologies.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">CISSP, CISM, or other relevant certifications are a plus.</span></li></ul> <br><strong class=\\"jdheading\\"></strong><br><br><h4><strong>Equal Opportunity</strong></h4><p style=\\"margin: 0px;\\">Rivian is an equal opportunity employer and complies with all applicable federal, state, and local fair employment practices laws. All qualified applicants will receive consideration for employment without regard to race, color, religion, national origin, ancestry, sex, sexual orientation, gender, gender expression, gender identity, genetic information or characteristics, physical or mental disability, marital/domestic partner status, age, military/veteran status, medical condition, or any other characteristic protected by law.</p><p style=\\"margin: 0px;\\">&nbsp;</p><p style=\\"margin: 0px;\\">Rivian is committed to ensuring that our hiring process is accessible for persons with disabilities. If you have a disability or limitation, such as those covered by the Americans with Disabilities Act, that requires accommodations to assist you in the search and application process, please email us at&nbsp;<a href=\\"mailto:candidateaccommodations@rivian.com?subject=Application%20to%20Rivian%20-%20Assistance%20Request\\" target=\\"_blank\\" rel=\\"noopener\\">candidateaccommodations@rivian.com</a>.</p><h4><strong>Candidate Data Privacy</strong></h4><p style=\\"margin: 0px;\\"><span data-contrast=\\"auto\\">Rivian may collect, use and disclose your personal information or personal data (within the meaning of the applicable data protection laws) when you apply for employment and/or participate in our recruitment processes (&ldquo;Candidate Personal Data&rdquo;). This data includes contact, demographic, communications, educational, professional, employment, social media/website, network/device, recruiting system usage/interaction, security and preference information. Rivian may use your Candidate Personal Data for the purposes of (i) tracking interactions with our recruiting system; (ii) carrying out, analyzing and improving our application and recruitment process, including assessing you and your application and conducting employment, background and reference checks; (iii) establishing an employment relationship or entering into an employment contract with you; (iv) complying with our legal, regulatory and corporate governance obligations; (v) recordkeeping; (vi) ensuring network and information security and preventing fraud; and (vii) as otherwise required or permitted by applicable law.</span><span data-ccp-props=\\"{"335551550":6,"335551620":6,"335559739":240}\\">&nbsp;</span></p><p style=\\"margin: 0px;\\">&nbsp;</p><p style=\\"margin: 0px;\\"><span data-contrast=\\"auto\\">Rivian may share your Candidate Personal Data with (i) internal personnel who have a need to know such information in order to perform their duties, including individuals on our People Team, Finance, Legal, and the team(s) with the position(s) for which you are applying; (ii) Rivian affiliates; and (iii) Rivian&rsquo;s service providers, including providers of background checks, staffing services, and cloud services.</span><span data-ccp-props=\\"{"335551550":6,"335551620":6,"335559739":240}\\">&nbsp;</span></p><p style=\\"margin: 0px;\\">&nbsp;</p><p style=\\"margin: 0px;\\"><span data-contrast=\\"auto\\">Rivian may transfer or store internationally your Candidate Personal Data, including to or in the United States, Canada, the United Kingdom, and the European Union and in the cloud, and this data may be subject to the laws and accessible to the courts, law enforcement and national security authorities of such jurisdictions.&nbsp;</span><span data-ccp-props=\\"{"335551550":6,"335551620":6,"335559739":240}\\">&nbsp;</span></p><p style=\\"margin: 0px;\\">&nbsp;</p><p style=\\"margin: 0px;\\"><strong>Please note that we are currently not accepting applications from third party application services.</strong></p>","location_name":"11 Tadije Sondermajera (Belgrade Serbia)","street_address":"11 Tadije Sondermajera","city":"Belgrade","country":"Serbia","country_code":"RS","postal_code":"11073","location_type":"LAT_LNG","latitude":44.80401,"longitude":20.46513,"additional_locations":[],"categories":[{"name":"Information Technology"}],"tags1":["Full Time"],"department":"","benefits":[],"employment_type":"FULL_TIME","qualifications":"<ul><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Bachelor's or Master's degree in Computer Science, Information Security, or a related field.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">At least 5 years of experience as a Privilege Access Management Engineer or similar role, with a focus on IAM and Cybersecurity.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Strong understanding of privileged access management concepts, principles, and best practices.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Experience with Beyond Insight applications like Password Safe, Secret Safe, EPM or similar PAM solutions.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Proficient in coding and scripting languages such as Python, PowerShell, or Shell scripting.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Solid knowledge of IAM technologies, protocols, and standards (e.g., LDAP, SAML, OAuth).</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Familiarity with cybersecurity frameworks (e.g., NIST Cybersecurity Framework, ISO 27001) and compliance requirements.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Excellent problem-solving and analytical skills, with the ability to assess risks and provide effective solutions.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Self-motivated and driven to stay updated with the latest IAM and cybersecurity trends and technologies.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">CISSP, CISM, or other relevant certifications are a plus.</span></li></ul>","hiring_organization":"Rivian","hiring_organization_logo":"https://Rivian.icims.com/icims2/servlet/icims2?module=AppInert&action=download&id=51&hashed=-1937123","responsibilities":"<ul><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">PAM Solution Design and Implementation: Design, architect, and implement privilege access management solutions, focusing on technologies like BeyondTrust or other PAM solutions. Assess business requirements, identify system vulnerabilities, and develop strategies to protect privileged accounts and access.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Privileged Account Management: Manage the lifecycle of privileged accounts, including provisioning, deprovisioning, and access reviews. Establish access controls, policies, and procedures to mitigate the risk associated with privileged accounts. Monitor and enforce privileged access management policies.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">IAM Integration: Integrate privilege access management solutions with existing Identity and Access Management (IAM) systems and processes. Collaborate with IAM teams to ensure a cohesive and comprehensive approach to access control and security.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Cybersecurity and Risk Management: Assess cybersecurity risks related to privileged access and develop strategies to mitigate those risks. Stay updated with the latest cybersecurity threats and industry best practices. Conduct periodic risk assessments and vulnerability scans to identify and address potential vulnerabilities.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Code Development and Automation: Develop custom scripts, tools, and automation workflows to streamline privileged access management processes. Automate repetitive tasks, implement role-based access controls, and enhance operational efficiency</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Incident Response and Forensics: Provide support during security incidents related to privileged accounts. Collaborate with incident response teams to investigate security breaches and perform forensic analysis of compromised accounts. Recommend and implement measures to prevent future incidents.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Documentation and Reporting: Create and maintain documentation, including design specifications, configuration guides, and standard operating procedures. Generate reports on privileged access management activities, including access requests, approvals, and entitlements.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Collaboration and Training: Collaborate with cross-functional teams, including IT, cybersecurity, and compliance, to ensure alignment and adherence to privileged access management policies and procedures. Conduct training sessions and awareness programs for end-users and system administrators.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Continuous Improvement: Continuously assess and enhance the privilege access management program. Identify opportunities for process improvements, system optimization, and automation. Stay updated with industry trends and emerging technologies in privileged access management.</span></li></ul>","posted_date":"2023-07-03T06:10:00+0000","apply_url":"https://sb-careers-rivian.icims.com/jobs/11777/login","internal":false,"searchable":true,"active":true,"applyable":true,"li_easy_applyable":true,"ats_code":"icims","hiring_flow_name":"iCIMS ATS Hiring Flow","meta_data":{"openingjobs":{"openingJobId":"0000979d4a23e9a5f83aa450ce78a329e5e3"},"icims":{"revision_int":7,"uuid":"37a1b132-6946-4bfb-b92e-133e321c7672","primary_posted_site_object":{"datePosted":"2023-07-03T06:10:00+0000","site":"sb-careers-rivian","siteId":"11d1562e-bc24-4e43-8d96-d25b706dda49"},"date_updated":"2023-09-15T12:17:32Z","config_keys":null,"jps_is_public":true},"elasticsearch":{"es_created":false},"ats_job_hash":"d6e30cb7558e56bf5a00d37ae2aa0dcd","googlejobs":{"jobName":"projects/helpful-passage-853/tenants/cb22eb5b-7e00-0000-0000-007edad744d3/jobs/134217477849522886"},"import_id":"54b1fecb-f4e2-4c4b-987c-5c3e661a81de","redirectOnApply":true,"questionservice":{"id":"27606643"},"import_source":"ImporterService","client_code":"rivian"},"update_date":"2023-09-15T12:18:30+0000","create_date":"2023-07-03T06:11:10+0000"},"formattedData":{"categories":"Information Technology","location":"Belgrade, Serbia","title":"Senior Privilege Access Management Engineer","seo_title":["Information+Technology","Belgrade%2C+Serbia","Senior+Privilege+Access+Management+Engineer"],"description":"<strong>About Rivian</strong><br><br><p style=\\"margin: 0px;\\">Rivian&nbsp;is on a mission to keep the world adventurous forever. This goes for the emissions-free Electric Adventure Vehicles we build, and the curious, courageous souls we seek to attract.&nbsp;</p><p style=\\"margin: 0px;\\">&nbsp;</p><p style=\\"margin: 0px;\\">As a company, we constantly challenge what&rsquo;s possible, never simply accepting what has always been done. We reframe old problems, seek new solutions and operate comfortably in areas that are unknown. Our backgrounds are diverse, but our team shares a love of the outdoors and a desire to protect it for future generations.&nbsp;</p> <br><strong>Role Summary</strong><br><br><p style=\\"margin: 0px;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">As a Senior Privilege Access Management (PAM), you will play a key role in designing, implementing, and managing privileged access controls to safeguard critical systems and data. You will be responsible for ensuring the effective and secure management of privileged accounts, access rights, and workflows across the organization.</span></p> <br><strong>Responsibilities</strong><br><br><ul><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">PAM Solution Design and Implementation: Design, architect, and implement privilege access management solutions, focusing on technologies like BeyondTrust or other PAM solutions. Assess business requirements, identify system vulnerabilities, and develop strategies to protect privileged accounts and access.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Privileged Account Management: Manage the lifecycle of privileged accounts, including provisioning, deprovisioning, and access reviews. Establish access controls, policies, and procedures to mitigate the risk associated with privileged accounts. Monitor and enforce privileged access management policies.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">IAM Integration: Integrate privilege access management solutions with existing Identity and Access Management (IAM) systems and processes. Collaborate with IAM teams to ensure a cohesive and comprehensive approach to access control and security.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Cybersecurity and Risk Management: Assess cybersecurity risks related to privileged access and develop strategies to mitigate those risks. Stay updated with the latest cybersecurity threats and industry best practices. Conduct periodic risk assessments and vulnerability scans to identify and address potential vulnerabilities.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Code Development and Automation: Develop custom scripts, tools, and automation workflows to streamline privileged access management processes. Automate repetitive tasks, implement role-based access controls, and enhance operational efficiency</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Incident Response and Forensics: Provide support during security incidents related to privileged accounts. Collaborate with incident response teams to investigate security breaches and perform forensic analysis of compromised accounts. Recommend and implement measures to prevent future incidents.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Documentation and Reporting: Create and maintain documentation, including design specifications, configuration guides, and standard operating procedures. Generate reports on privileged access management activities, including access requests, approvals, and entitlements.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Collaboration and Training: Collaborate with cross-functional teams, including IT, cybersecurity, and compliance, to ensure alignment and adherence to privileged access management policies and procedures. Conduct training sessions and awareness programs for end-users and system administrators.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Continuous Improvement: Continuously assess and enhance the privilege access management program. Identify opportunities for process improvements, system optimization, and automation. Stay updated with industry trends and emerging technologies in privileged access management.</span></li></ul> <br><strong>Qualifications</strong><br><br><ul><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Bachelor's or Master's degree in Computer Science, Information Security, or a related field.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">At least 5 years of experience as a Privilege Access Management Engineer or similar role, with a focus on IAM and Cybersecurity.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Strong understanding of privileged access management concepts, principles, and best practices.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Experience with Beyond Insight applications like Password Safe, Secret Safe, EPM or similar PAM solutions.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Proficient in coding and scripting languages such as Python, PowerShell, or Shell scripting.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Solid knowledge of IAM technologies, protocols, and standards (e.g., LDAP, SAML, OAuth).</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Familiarity with cybersecurity frameworks (e.g., NIST Cybersecurity Framework, ISO 27001) and compliance requirements.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Excellent problem-solving and analytical skills, with the ability to assess risks and provide effective solutions.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Self-motivated and driven to stay updated with the latest IAM and cybersecurity trends and technologies.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">CISSP, CISM, or other relevant certifications are a plus.</span></li></ul> <br><strong class=\\"jdheading\\"></strong><br><br><h4><strong>Equal Opportunity</strong></h4><p style=\\"margin: 0px;\\">Rivian is an equal opportunity employer and complies with all applicable federal, state, and local fair employment practices laws. All qualified applicants will receive consideration for employment without regard to race, color, religion, national origin, ancestry, sex, sexual orientation, gender, gender expression, gender identity, genetic information or characteristics, physical or mental disability, marital/domestic partner status, age, military/veteran status, medical condition, or any other characteristic protected by law.</p><p style=\\"margin: 0px;\\">&nbsp;</p><p style=\\"margin: 0px;\\">Rivian is committed to ensuring that our hiring process is accessible for persons with disabilities. If you have a disability or limitation, such as those covered by the Americans with Disabilities Act, that requires accommodations to assist you in the search and application process, please email us at&nbsp;<a href=\\"mailto:candidateaccommodations@rivian.com?subject=Application%20to%20Rivian%20-%20Assistance%20Request\\" target=\\"_blank\\" rel=\\"noopener\\">candidateaccommodations@rivian.com</a>.</p><h4><strong>Candidate Data Privacy</strong></h4><p style=\\"margin: 0px;\\"><span data-contrast=\\"auto\\">Rivian may collect, use and disclose your personal information or personal data (within the meaning of the applicable data protection laws) when you apply for employment and/or participate in our recruitment processes (&ldquo;Candidate Personal Data&rdquo;). This data includes contact, demographic, communications, educational, professional, employment, social media/website, network/device, recruiting system usage/interaction, security and preference information. Rivian may use your Candidate Personal Data for the purposes of (i) tracking interactions with our recruiting system; (ii) carrying out, analyzing and improving our application and recruitment process, including assessing you and your application and conducting employment, background and reference checks; (iii) establishing an employment relationship or entering into an employment contract with you; (iv) complying with our legal, regulatory and corporate governance obligations; (v) recordkeeping; (vi) ensuring network and information security and preventing fraud; and (vii) as otherwise required or permitted by applicable law.</span><span data-ccp-props=\\"{"335551550":6,"335551620":6,"335559739":240}\\">&nbsp;</span></p><p style=\\"margin: 0px;\\">&nbsp;</p><p style=\\"margin: 0px;\\"><span data-contrast=\\"auto\\">Rivian may share your Candidate Personal Data with (i) internal personnel who have a need to know such information in order to perform their duties, including individuals on our People Team, Finance, Legal, and the team(s) with the position(s) for which you are applying; (ii) Rivian affiliates; and (iii) Rivian&rsquo;s service providers, including providers of background checks, staffing services, and cloud services.</span><span data-ccp-props=\\"{"335551550":6,"335551620":6,"335559739":240}\\">&nbsp;</span></p><p style=\\"margin: 0px;\\">&nbsp;</p><p style=\\"margin: 0px;\\"><span data-contrast=\\"auto\\">Rivian may transfer or store internationally your Candidate Personal Data, including to or in the United States, Canada, the United Kingdom, and the European Union and in the cloud, and this data may be subject to the laws and accessible to the courts, law enforcement and national security authorities of such jurisdictions.&nbsp;</span><span data-ccp-props=\\"{"335551550":6,"335551620":6,"335559739":240}\\">&nbsp;</span></p><p style=\\"margin: 0px;\\">&nbsp;</p><p style=\\"margin: 0px;\\"><strong>Please note that we are currently not accepting applications from third party application services.</strong></p>","qualifications":"<ul><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Bachelor's or Master's degree in Computer Science, Information Security, or a related field.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">At least 5 years of experience as a Privilege Access Management Engineer or similar role, with a focus on IAM and Cybersecurity.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Strong understanding of privileged access management concepts, principles, and best practices.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Experience with Beyond Insight applications like Password Safe, Secret Safe, EPM or similar PAM solutions.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Proficient in coding and scripting languages such as Python, PowerShell, or Shell scripting.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Solid knowledge of IAM technologies, protocols, and standards (e.g., LDAP, SAML, OAuth).</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Familiarity with cybersecurity frameworks (e.g., NIST Cybersecurity Framework, ISO 27001) and compliance requirements.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Excellent problem-solving and analytical skills, with the ability to assess risks and provide effective solutions.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Self-motivated and driven to stay updated with the latest IAM and cybersecurity trends and technologies.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">CISSP, CISM, or other relevant certifications are a plus.</span></li></ul>","responsibilities":"<ul><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">PAM Solution Design and Implementation: Design, architect, and implement privilege access management solutions, focusing on technologies like BeyondTrust or other PAM solutions. Assess business requirements, identify system vulnerabilities, and develop strategies to protect privileged accounts and access.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Privileged Account Management: Manage the lifecycle of privileged accounts, including provisioning, deprovisioning, and access reviews. Establish access controls, policies, and procedures to mitigate the risk associated with privileged accounts. Monitor and enforce privileged access management policies.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">IAM Integration: Integrate privilege access management solutions with existing Identity and Access Management (IAM) systems and processes. Collaborate with IAM teams to ensure a cohesive and comprehensive approach to access control and security.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Cybersecurity and Risk Management: Assess cybersecurity risks related to privileged access and develop strategies to mitigate those risks. Stay updated with the latest cybersecurity threats and industry best practices. Conduct periodic risk assessments and vulnerability scans to identify and address potential vulnerabilities.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Code Development and Automation: Develop custom scripts, tools, and automation workflows to streamline privileged access management processes. Automate repetitive tasks, implement role-based access controls, and enhance operational efficiency</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Incident Response and Forensics: Provide support during security incidents related to privileged accounts. Collaborate with incident response teams to investigate security breaches and perform forensic analysis of compromised accounts. Recommend and implement measures to prevent future incidents.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Documentation and Reporting: Create and maintain documentation, including design specifications, configuration guides, and standard operating procedures. Generate reports on privileged access management activities, including access requests, approvals, and entitlements.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Collaboration and Training: Collaborate with cross-functional teams, including IT, cybersecurity, and compliance, to ensure alignment and adherence to privileged access management policies and procedures. Conduct training sessions and awareness programs for end-users and system administrators.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 10pt;\\">Continuous Improvement: Continuously assess and enhance the privilege access management program. Identify opportunities for process improvements, system optimization, and automation. Stay updated with industry trends and emerging technologies in privileged access management.</span></li></ul>","clientName":"Rivian Careers Home","locations":"Belgrade, Serbia"}},"isNoIndex":false,"preloginConfiguration":null,"contextSettings":{"contextDefinitions":[{"name":"careers-home","displayName":"Rivian Careers Home","metadata":{"title":"Rivian Careers Home","description":"Rivian Careers Home"}},{"name":"life","displayName":"Rivian Life","metadata":{"title":"Rivian Life","description":"Rivian Life"}},{"name":"work","displayName":"Rivian Work","metadata":{"title":"Rivian Work","description":"Rivian Work"}},{"name":"students","displayName":"Rivian Students","metadata":{"title":"Rivian Students","description":"Rivian Students"}},{"redirectToForm":false,"successCTAButtonEnabled":true,"name":"talent-network","displayName":"Rivian Talent Community Landing Page","urlPath":"/talent-network","overrides":{"talentcommunity.integration.v2":{"enabled":true}},"createdAt":"2023-03-22T14:29:56+0000","creatorId":183525535,"creatorName":"icims-admin@rivian.com","updatedAt":"2023-03-31T18:26:57+0000"}],"defaultContext":"careers-home","currentContext":"careers-home","redirectWithSources":true,"currentClient":"rivian"},"similarJobsEnabled":false,"login":{},"inhouseAlertsEnabled":false}; </script>\n<script> window.jobDescriptionTemplates = {\n  sectionTop: "<!-- FOR BRANDING ELEMENTS TO BE PLACED ABOVE JOB DESCRIPTION BODY -->",\n  sectionBottom: "<!-- FOR BRANDING ELEMENTS TO BE PLACED BELOW JOB DESCRIPTION BODY -->",\n  additionalButton: "<!-- additional button on JD page -->",\n  getReferred: "<a href=\\"undefined\\" class=\\"get-referred cta-button\\">\\n  <span class=\\"fa fa-users\\" aria-hidden=\\"true\\"></span>\\n  Get Referred\\n</a>",\n  rightRailMedia: "",\n};\n</script>\n\n  <script src="https://app.jibecdn.com/prod/descriptions/1.1.39/polyfills-es5.js" nomodule=""></script>\n  <script src="https://app.jibecdn.com/prod/descriptions/1.1.39/polyfills.js"></script>\n  <script src="https://app.jibecdn.com/prod/descriptions/1.1.39/scripts.js"></script>\n  <script src="https://app.jibecdn.com/prod/descriptions/1.1.39/main.js"></script>\n\n\n\n  <script src="https://app.jibecdn.com/prod/social-share/0.0.20/runtime.js"></script>\n  <script src="https://app.jibecdn.com/prod/social-share/0.0.20/polyfills.js"></script>\n  <script src="https://app.jibecdn.com/prod/social-share/0.0.20/polyfills-es5.js" nomodule=""></script>\n  <script src="https://app.jibecdn.com/prod/social-share/0.0.20/vendor.js"></script>\n  <script src="https://app.jibecdn.com/prod/social-share/0.0.20/main.js"></script>\n\n\n\n\n\n\n\n\n<script data-cookieconsent="statistics">\n
    \n

    /**

    \n
      \n
    • @description: send an arbitrary payload to the server-side for later consumption.
    • \n
    • @param {Object} payload - a json payload that contains arbitrary data
    • \n
    • @param {String} payload.event_name - the unique name to associate with the event
    • \n
    • @param {String} payload.slug - the job id to associate with the event
    • \n
    • @param {String} payload.language - the locale to associate with the event\n */\n function sendEvent(payload) {\n// validation check\nif (!(payload || payload.event_name)) {\n console.error('insufficient data for meaningful response.');\n return;\n}
    • \n
    \n
    else {\n\n  // send ajax request to backend for consumption\n  $.ajax({\n    method: 'POST',\n    url: '/api/impression',\n    data: payload,\n    success: function (res) {\n      // console.log('successful ajax call with response: ', res);\n    }\n  });\n}\n
    \n

    }\n\n

    \n
    <!-- Accessibility BEGIN -->\n
    \n\n\n\n
    <script>\n  var referrer = location.protocol + "//" + location.host\n  if (document.referrer.length > 0 && document.referrer.indexOf(referrer) === -1 && !window.sessionStorage.getItem('externalReferrer')) {\n    window.sessionStorage.setItem('externalReferrer', document.referrer);\n  }\n</script>\n\n\n\n\n    \n
    \n

    \n
                <div class="third-party-button-container column-container">\n                <a aria-label="dismiss cookie message" role="button" tabindex="0" class="btn-primary accept-button" id="cookie-consent-accept-button">\n                  Okay\n                </a>\n            </div>\n        </div>\n        <span aria-label="dismiss cookie message" tabindex="0" class="close-button" id="cookie-consent-x">\n            x\n        </span>\n    </div>\n
    \n
    \n\n\n
        <script>\n        window.gdprConfiguration = {"enabled":true,"pixel_consent":{"enabled":true,"cookie_notice":true,"third_party":false,"versionId":"search-consent-1","show_consent":true},"apply_consent":{"enabled":false,"job_specific":true,"versionId":"apply-consent-1"},"ttl":2592000000};\n    </script>\n    <script type="text/javascript"> function defer(method) { if (window.jQuery) { method(); } else { setTimeout(function() { defer(method) }, 50); } } defer(function() { window.$ = jQuery; var head = window.document.querySelectorAll('head')[0], scrp = document.createElement('script'); scrp.setAttribute('type', 'text/javascript'); scrp.src = '/dist/js/gdpr.js?v=4.5.468'; jQuery(function() { window.document.body.appendChild(scrp); }); }); </script>\n
    \n","datePosted":"2023-07-03T11:00:16.946Z","validThrough":"2024-03-13","employmentType":[],"hiringOrganization":{"@type":"Organization","name":"Rivian","description":"Rivian is an automotive technology company that develops products and services to advance the shift to sustainable mobility. The company creates solutions that redefine traditional automotive economics and remove the pain points of conventional ownership. It also manufactures autonomous electric vehicles intended to offer a comfortable and eco-friendly driving experience.","numberOfEmployees":9970,"address":[{"address":{"@type":"PostalAddress","addressLocality":"Irvine, CA, USA"}},{"address":{"@type":"PostalAddress","addressLocality":"Plymouth, MI, USA"}}],"sameAs":"https://rivian.com","url":"https://rivian.com","logo":"https://cdn.getro.com/companies/3490f08b-fa29-5c17-9841-55a0fe457a14","memberOf":{"@type":"Organization","name":"Amazon Climate Pledge","description":"","logo":"https://cdn.filepicker.io/api/file/VovG1DnqQ1OAUJgLCMuW","url":"portfoliojobs.theclimatepledge.com"},"keywords":"Manufacturing, Transportation"},"jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Belgrade, Serbia"}}}

    Senior Privilege Access Management Engineer

    Rivian

    Rivian

    Belgrade, Serbia
    Posted on Monday, July 3, 2023

    Senior Privilege Access Management Engineer

    CAROUSEL_PARAGRAPH

    JOB_DESCRIPTION.SHARE.HTML

    Job Description

    About Rivian

    Rivian is on a mission to keep the world adventurous forever. This goes for the emissions-free Electric Adventure Vehicles we build, and the curious, courageous souls we seek to attract. 

     

    As a company, we constantly challenge what’s possible, never simply accepting what has always been done. We reframe old problems, seek new solutions and operate comfortably in areas that are unknown. Our backgrounds are diverse, but our team shares a love of the outdoors and a desire to protect it for future generations. 


    Role Summary

    As a Senior Privilege Access Management (PAM), you will play a key role in designing, implementing, and managing privileged access controls to safeguard critical systems and data. You will be responsible for ensuring the effective and secure management of privileged accounts, access rights, and workflows across the organization.


    Responsibilities

    • PAM Solution Design and Implementation: Design, architect, and implement privilege access management solutions, focusing on technologies like BeyondTrust or other PAM solutions. Assess business requirements, identify system vulnerabilities, and develop strategies to protect privileged accounts and access.
    • Privileged Account Management: Manage the lifecycle of privileged accounts, including provisioning, deprovisioning, and access reviews. Establish access controls, policies, and procedures to mitigate the risk associated with privileged accounts. Monitor and enforce privileged access management policies.
    • IAM Integration: Integrate privilege access management solutions with existing Identity and Access Management (IAM) systems and processes. Collaborate with IAM teams to ensure a cohesive and comprehensive approach to access control and security.
    • Cybersecurity and Risk Management: Assess cybersecurity risks related to privileged access and develop strategies to mitigate those risks. Stay updated with the latest cybersecurity threats and industry best practices. Conduct periodic risk assessments and vulnerability scans to identify and address potential vulnerabilities.
    • Code Development and Automation: Develop custom scripts, tools, and automation workflows to streamline privileged access management processes. Automate repetitive tasks, implement role-based access controls, and enhance operational efficiency
    • Incident Response and Forensics: Provide support during security incidents related to privileged accounts. Collaborate with incident response teams to investigate security breaches and perform forensic analysis of compromised accounts. Recommend and implement measures to prevent future incidents.
    • Documentation and Reporting: Create and maintain documentation, including design specifications, configuration guides, and standard operating procedures. Generate reports on privileged access management activities, including access requests, approvals, and entitlements.
    • Collaboration and Training: Collaborate with cross-functional teams, including IT, cybersecurity, and compliance, to ensure alignment and adherence to privileged access management policies and procedures. Conduct training sessions and awareness programs for end-users and system administrators.
    • Continuous Improvement: Continuously assess and enhance the privilege access management program. Identify opportunities for process improvements, system optimization, and automation. Stay updated with industry trends and emerging technologies in privileged access management.

    Qualifications

    • Bachelor's or Master's degree in Computer Science, Information Security, or a related field.
    • At least 5 years of experience as a Privilege Access Management Engineer or similar role, with a focus on IAM and Cybersecurity.
    • Strong understanding of privileged access management concepts, principles, and best practices.
    • Experience with Beyond Insight applications like Password Safe, Secret Safe, EPM or similar PAM solutions.
    • Proficient in coding and scripting languages such as Python, PowerShell, or Shell scripting.
    • Solid knowledge of IAM technologies, protocols, and standards (e.g., LDAP, SAML, OAuth).
    • Familiarity with cybersecurity frameworks (e.g., NIST Cybersecurity Framework, ISO 27001) and compliance requirements.
    • Excellent problem-solving and analytical skills, with the ability to assess risks and provide effective solutions.
    • Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams.
    • Self-motivated and driven to stay updated with the latest IAM and cybersecurity trends and technologies.
    • CISSP, CISM, or other relevant certifications are a plus.



    Equal Opportunity

    Rivian is an equal opportunity employer and complies with all applicable federal, state, and local fair employment practices laws. All qualified applicants will receive consideration for employment without regard to race, color, religion, national origin, ancestry, sex, sexual orientation, gender, gender expression, gender identity, genetic information or characteristics, physical or mental disability, marital/domestic partner status, age, military/veteran status, medical condition, or any other characteristic protected by law.

     

    Rivian is committed to ensuring that our hiring process is accessible for persons with disabilities. If you have a disability or limitation, such as those covered by the Americans with Disabilities Act, that requires accommodations to assist you in the search and application process, please email us at candidateaccommodations@rivian.com.

    Candidate Data Privacy

    Rivian may collect, use and disclose your personal information or personal data (within the meaning of the applicable data protection laws) when you apply for employment and/or participate in our recruitment processes (“Candidate Personal Data”). This data includes contact, demographic, communications, educational, professional, employment, social media/website, network/device, recruiting system usage/interaction, security and preference information. Rivian may use your Candidate Personal Data for the purposes of (i) tracking interactions with our recruiting system; (ii) carrying out, analyzing and improving our application and recruitment process, including assessing you and your application and conducting employment, background and reference checks; (iii) establishing an employment relationship or entering into an employment contract with you; (iv) complying with our legal, regulatory and corporate governance obligations; (v) recordkeeping; (vi) ensuring network and information security and preventing fraud; and (vii) as otherwise required or permitted by applicable law. 

     

    Rivian may share your Candidate Personal Data with (i) internal personnel who have a need to know such information in order to perform their duties, including individuals on our People Team, Finance, Legal, and the team(s) with the position(s) for which you are applying; (ii) Rivian affiliates; and (iii) Rivian’s service providers, including providers of background checks, staffing services, and cloud services. 

     

    Rivian may transfer or store internationally your Candidate Personal Data, including to or in the United States, Canada, the United Kingdom, and the European Union and in the cloud, and this data may be subject to the laws and accessible to the courts, law enforcement and national security authorities of such jurisdictions.  

     

    Please note that we are currently not accepting applications from third party application services.

    Subscribe to learn about our latest news, updates and adventures.